Category «Other»

13 Ways Overturning Roe v. Wade Affects You (even if you think it doesn’t)

Kathy Biehl is a lawyer licensed in two states, as well as a prolific multidisciplinary author and writer. Roe v. Wade has been settled law during her entire career. In this article Biehl succinctly and expertly identifies how the upcoming Supreme Court decision in Dobbs V. Jackson Women’s Health Organization, a draft of which was “leaked” on May 2, 2022, will impact many facets of our society as well as our democracy.

Subjects: Congress, Constitutional Law, Ethics, Health, Human Rights, Legal Profession, Legal Research, Privacy

Pete Recommends – Weekly highlights on cyber security issues, May 30, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: Cyber security 101: Protect your privacy from hackers, spies, and the government; Inside the Government Fiasco That Nearly Closed the U.S. Air System; My Instagram account was hacked and two-factor authentication didn’t help; Serious Warning Issued For Millions Of Google Gmail Users; and Report: Russian Botnet Can Spam Social Media on ‘Massive Scale’.

Subjects: Communications, Criminal Law, Cybercrime, Cyberlaw, Cybersecurity, E-Government, Economy, KM, Privacy, Social Media, Technology Trends, Travel

Pete Recommends – Weekly highlights on cyber security issues, May 21, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. – Four highlights from this week: How Often Do Ads Share Your Data Every Day? Hundreds of Times; Threat actors compromising US business online checkout pages to steal credit card information; Your Bosses Could Have a File on You, and They May Misinterpret It; and Hackers are Hijacking Phone Numbers to Empty Crypto Accounts.

Subjects: AI, Criminal Law, Cybercrime, Cybersecurity, Economy, Financial System, KM, Privacy, Social Media, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, May 14, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: Survey: 93% of Americans Fear Cyberwarfare Against U.S.; ICE Has Assembled a ‘Surveillance Dragnet’ with Facial Recognition and Data, Report Says; Thousands of Popular Websites See What You Type—Before You Hit Submit; EV Infrastructure Vulnerabilities Put Cars, the Grid at Risk; and What exactly is Web3?

Subjects: AI, Big Data, Computer Security, Criminal Law, Cybercrime, Cybersecurity, Legal Research, Privacy

Pete Recommends – Weekly highlights on cyber security issues, May 8, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Supreme Court privacy vs. your right to privacy; NIST updates guidance for defending against supply-chain attacks; SafeGraph Will Stop Selling Planned Parenthood Location Data; and Be Smart. Shop Safe. We created this guide to help you shop for safe, secure connected products.

Subjects: Big Data, Blockchain, Courts & Technology, Criminal Law, Cybercrime, Cybersecurity, E-Commerce, Healthcare, Intellectual Property, Privacy

Web Guide for the New Economy 2022

Accurate and actionable data on the economy is critical to many aspects of our research and scholarship. This guide by research expert Marcus P. Zillman provides researchers with links to information on a range of sources focused on new economy data and analysis from the public and private sectors, as well as scholarly work, news, government information, reports and alerts. Many of these sources should find a place in your customized research toolkit. The sites recommended in this guide are all free to use, and they are published by advocacy, government, corporate, academic, international financial groups and research experts. Many of the sites are updated on a regular basis, so it is recommended that you use RSS feeds or alerts to remain abreast of changes.

Subjects: Big Data, Business Research, Competitive Intelligence, Congress, Economy, Financial System, Government Resources, Internet Resources, KM, Legal Research, Search Strategies, United States Law

Elon Musk’s plans for Twitter could make its misinformation problems worse

As a researcher of social media platforms, Anjana Susarla, the Omura-Saxena Professorship in Responsible AI at the Broad College of Business, finds that Musk’s ownership of Twitter and his stated reasons for buying the company raise important issues. Those issues stem from the nature of the social media platform and what sets it apart from others.

Subjects: Civil Liberties, Free Speech, Legal Research, Securities Law, Social Media

Pete Recommends – Weekly highlights on cyber security issues, April 30, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Amazon Workers Can Now Keep Cell Phones at Work; Best Reverse Image Search Tool: Google, Bing, Pixsy, Tineye; Google adds more ways to remove yourself from Search results; and Shut Stalkers Out of Your Tech.

Subjects: Blockchain, Civil Liberties, Communications, Cybersecurity, Economy, Privacy, Reference Resources, Search Engines, Search Strategies

Propaganda, Mis- and Disinformation, and Censorship: The War for Hearts and Minds

Author and blogger Dave Pollard addresses the incendiary global war of lies vs. truth, reminiscent of the MAD Magazine cartoon Spy Vs. Spy for those who of us who can recall the scenarios they played which remain eerily prescient. Pollard posits the most effective way to win and retain political power is by seizing the hearts and minds of citizens through a mix of propaganda, mis- and disinformation, and censorship. He continues, this is especially true now, living with a ubiquitous and unceasing firehose of often-conflicting information, and exploitative for-profit “social” media controlled by a handful of dimwitted and unstable western oligarchs.

Subjects: Communications, Competitive Intelligence, Ethics, Free Speech, Information Management, KM, News Resources, Social Media

The FBI is breaking into corporate computers to remove malicious code – smart cyber defense or government overreach?

Cybersecurity scholar Scott Shackelford discusses how the FBI has the authority right now to access privately owned computers without their owners’ knowledge or consent, and to delete software. It’s part of a government effort to contain the continuing attacks on corporate networks running Microsoft Exchange software, and it’s an unprecedented intrusion that’s raising legal questions about just how far the government can go.

Subjects: Communications Law, Computer Security, Cybercrime, Cyberlaw, Cybersecurity, Email Security, Legal Ethics, Legal Research, Legal Technology, Privacy